cyber security
Quiz by Sneha Manikandan
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
- Q1
what is cyber security?
give the data to strangers
protects the data from digital attack
support hackers
30s - Q2
what is firewall?
used to share data
barrier between internal network and external network
search engine
30s - Q3
Practices related to cyber security?
two-factor authentication
safe downloads
software update
all the above
30s - Q4
who is the father of computer security?
robert
August kerckhoffs
charles
bob thomas
30s - Q5
Which of the following is a type of cyber security?
cloud security
application security
network security
All of the above
30s - Q6
which of the following is not a cyber crime?
Advance encryption standard
malware
man in the middle
denial of service
30s - Q7
Which of the following is a component of cyber security?
Attacks
Internet of things
AI
Data base
30s - Q8
Which of the following is a type of cyber attack?
All of the above
Password attack
SQL injection
Phishing
30s - Q9
Which of the following is not an advantage of cyber security?
gives privacy to user
makes the system slower
protects system against virus
minimize computer freezing and crashes
30s - Q10
cyber space was coined by
William gibson
Richarad
robert charles
Andrew
30s - Q11
which of the following act violates cyber security?
exploit
vulnerability
attack
threat
30s - Q12
Which of the following actions compromise cyber security?
attack
Threat
vulnerability
exploit
30s - Q13
Which of the following do cyber attackers commonly target for fetching IP address of a target or a victim user?
webpages
IP trackers
emails
Websites
30s - Q14
which of the following is defined as an attempt to harm, damage or cause threat to a system?
Digital crime
threats
system hijacking
Cyber attack
30s - Q15
IT security in any firm or organisation is maintained and handled by
Software security specialist
security auditor
IT security engineer
CEO
30s